期刊文献+

基于EBS的动态密钥管理方法共谋问题 被引量:7

Collusion Problem of the EBS-Based Dynamic Key Management Scheme
在线阅读 下载PDF
导出
摘要 设计安全、合理的密钥管理方法是解决无线传感器网络安全性问题的核心内容.基于exclusion basis system(EBS)的动态密钥管理方法由于安全性高,动态性能和可扩展性好,受到了广泛关注.但在这种方法中存在共谋问题,即对于被捕获节点通过共享各自信息实施的联合攻击抵抗性较差.针对这一问题,分析了传感器节点形成共谋过程中的特点,以最短共谋链的长度为目标提出了共谋问题的优化模型.在此基础上,提出了基于离散粒子群算法的无线传感器网络共谋问题优化方法.仿真实验结果表明,与前人的工作相比,采用此优化模型和方法不仅提高了捕获网络难度,而且显著增强了网络对捕获节点的抵抗性. The security of wireless sensor networks has attracted much attention in recent years and the key management is the focus. EBS-based dynamic key management scheme is a new approach for wireless sensor networks. Its major advantages are its enhanced network survivability, high dynamic performance and better support for network expansion. But it suffers from the collusion problem, which means it is prone to the cooperative attack of the compromised nodes. In this paper, the feature of the collusion problem is analyzed and an optimization model is proposed, maximizing the length of the shortest collusion chain, which is the key issue of the problem. A discrete particle swarm optimization algorithm for the collusion problem is also presented based on the optimization model proposed. Simulation results show that compared with the former works, the resilience of the network and the difficulty to compromise the whole network are both greatly improved.
出处 《软件学报》 EI CSCD 北大核心 2009年第9期2531-2541,共11页 Journal of Software
基金 国家自然科学基金Nos.69774011 60433050~~
关键词 无线传感器网络 安全性 基于EBS的动态密钥管理 共谋问题 离散粒子群算法 wireless sensor networks security EBS-based dynamic key management collusion problem DPSO
  • 相关文献

参考文献1

二级参考文献26

  • 1[1]Kennedy J, Eberhart RC,Shi Y.Swarm Intelligence[M].San Francisco:Morgan Kaufman Publishers,2001.
  • 2[2]Mataric M.Designing and Understanding Adaptive Group Behavior[J].Adaptive Behavior,1995,4:1-12.
  • 3[3]Dorigo M,V Maniezzo,A Colorni.The Ant System:Optimization by a Colony of Cooperating Agents[J].IEEE Transactions on Systems, Man and Cybernetics, 1996.
  • 4[4]Kennedy J,Eberhart R C.Particle Swarm Optimization[C].Proceedings of IEEE International Conference on Neutral Networks,Perth,Australia,1995.1942-1948.
  • 5[5]Kennedy J.The Particle Swarm:Social Adaptation of Knowledge[C].Proceedings of IEEE International Conference on Evolutionary Computation,Indianapolis,Indiana,1997.
  • 6[6]Eberhart R C,Kennedy J.A New Optimizer Using Particle Swarm Theory[C].Proceedings of Sixth International Symposium Micro Machine and Human Science,Nagoya,Japan,1995.
  • 7[7]Shi Y H,Eberhart R C.Parameter Selection in Particle Swarm Optimization[C].Annual,1998.
  • 8[8]Eberhart R C, Shi Y H.Comparison between Genetic Algorithms and Particle Swarm Optimization[R].Annual Conference on Evolutionary Programming, San Diego,1998.
  • 9[9]Shi Y H,Eberhart R C.A Modified Particle Swarm Optimizer[R].IEEE International Conference on Evolutionary Computation,Anchorage,Alaska,1998.
  • 10[10]Shi Y H,et al.Empirical Study of Particle Swarm Optimization[R].Proceedings of Congress on Evolutionary Computation,1999.

共引文献179

同被引文献63

  • 1肖德贵,杨金,罗娟.基于多项式和分组的无线传感器网络密钥管理方案[J].计算机应用研究,2009,26(2):680-682. 被引量:10
  • 2周海刚,邱正伦,肖军模.网络主动防御安全模型及体系结构[J].解放军理工大学学报(自然科学版),2005,6(1):40-43. 被引量:26
  • 3苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议[J].软件学报,2007,18(5):1218-1231. 被引量:111
  • 4Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing for wireless sensor networks[J]. Computer Communications, 2006, 29, 216-230.
  • 5Xiao Y, et al..A survey of key management schemes in wireless sensor networks[J]. Computer Communications, 2007, 30, 2314-2341.
  • 6Kuldeep R. Garimella.Distributed key management for wireless sensor networks[C] Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks,2009: 23-28.
  • 7Choa J H, Chena I R, Wang D C. Performance optimization of region-based group key management in mobile ad hoe networks[J]. Performance Evaluation, 2008, 65:319-344.
  • 8Wander A S, Gura N, Eberle H, et. al. Energy Analysis of Public- Key Cryptography for Wireless Sensor Networks[C]//Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), 2005: 324-328.
  • 9Gaubatz G, Kaps J, Sunar B. Public Key Cryptography in Sensor Networks-Revisited[J]. Lecture Notes in Computer Science, 2004, 3313: 2-18.
  • 10Naureen A, Akram A, Riaz R, et al. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks[J]. Lecture Notes in Computer Science, 2009, 5576: 629-701.

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部